- We have helped thousands of organizations understand their Information Security needs, and we look forward to helping you understand your own unique strengths.
- Many organizations report feeling a bit overwhelmed understanding and implementing HIPAA compliance.
- We review following:
- Risk Assessment and Analysis
- IT System Activity Monitoring
- IT Security Officer Designee
- Emergency Data Backup and Restoration Procedures
- Contingency planning
- Email encryption
- System encryption
- Storage encryption when data inbound, at rest and outbound
- Training for employees to maintain data safeguards
- Ex-employees PHI safeguard
- Monitor and audit all access
- PHI Asset Management
- Control BYOD with respect to PHI
Call us for our HIPAA Risk Assessment